The Old, The New, and The Future: McAfee Labs September Threats Report
As technology makes our lives increasingly convenient, we rely on it more. We use it constantly nowadays, even entrusting our...
Like This Post – And Get Hacked
Admit it. Social media has made your world a little smaller—and it’s all in the palm of your hands. Our...
Hardware Hack Bypasses iPhone PIN Security Counter
A security researcher from the University of Cambridge has found a way to hack the iPhone NAND memory hardware to...
Why Cybercriminals Want to Rack Up Your Phone Bill: The CallJam Malware
As smartphones get more sophisticated, it’s easy to forget their humble origins. Through today’s mobile apps, we can manage...
The Quarterly Threats Report: What Does It Mean for You?
This blog was written by Bruce Snell. The latest edition of the Quarterly Threats Report (QTR) was released this week...
Plug with Caution! How to Stop Hackers from Stealing More than Battery Power
There’s nothing like that stressful moment when you look to your phone and see a red battery and a low...
The Android Photo Hack: A Picture Says a Thousand Commands
Most people have heard the story of the Trojan horse. We’ve learned the moral of that story: don’t trust gifts...
The increasing threat of hackers at major sporting events
This blog post was written by Nick Viney. Every year, sporting events around the world become a desirable target for...
When Voice Recognition Goes Wrong: YouTube Videos Can Say “Ok Google”
YouTube videos are like today’s candid camera: they can be fun, educational, and, sometimes, a window into someone else’s most...
The Four Mobile Security Threats You Need to Know About
“Florals for Spring, groundbreaking.” There are few movie quotes that continue to resonate as much as the line delivered by...